Skip to main content

Showing 1–47 of 47 results for author: Phan, N

  1. arXiv:2405.09572  [pdf, other

    eess.SP cs.AI

    Deep Neural Operator Enabled Digital Twin Modeling for Additive Manufacturing

    Authors: Ning Liu, Xuxiao Li, Manoj R. Rajanna, Edward W. Reutzel, Brady Sawyer, Prahalada Rao, Jim Lua, Nam Phan, Yue Yu

    Abstract: A digital twin (DT), with the components of a physics-based model, a data-driven model, and a machine learning (ML) enabled efficient surrogate, behaves as a virtual twin of the real-world physical process. In terms of Laser Powder Bed Fusion (L-PBF) based additive manufacturing (AM), a DT can predict the current and future states of the melt pool and the resulting defects corresponding to the inp… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2403.06095  [pdf, other

    cs.SE cs.AI

    RepoHyper: Better Context Retrieval Is All You Need for Repository-Level Code Completion

    Authors: Huy N. Phan, Hoang N. Phan, Tien N. Nguyen, Nghi D. Q. Bui

    Abstract: Code Large Language Models (CodeLLMs) have demonstrated impressive proficiency in code completion tasks. However, they often fall short of fully understanding the extensive context of a project repository, such as the intricacies of relevant files and class hierarchies, which can result in less precise completions. To overcome these limitations, we present \tool, a multifaceted framework designed… ▽ More

    Submitted 16 March, 2024; v1 submitted 10 March, 2024; originally announced March 2024.

    Comments: Under Review

  3. arXiv:2311.11096  [pdf, other

    eess.IV cs.CV

    On the Out of Distribution Robustness of Foundation Models in Medical Image Segmentation

    Authors: Duy Minh Ho Nguyen, Tan Ngoc Pham, Nghiem Tuong Diep, Nghi Quoc Phan, Quang Pham, Vinh Tong, Binh T. Nguyen, Ngan Hoang Le, Nhat Ho, Pengtao Xie, Daniel Sonntag, Mathias Niepert

    Abstract: Constructing a robust model that can effectively generalize to test samples under distribution shifts remains a significant challenge in the field of medical imaging. The foundational models for vision and language, pre-trained on extensive sets of natural image and text data, have emerged as a promising approach. It showcases impressive learning abilities across different tasks with the need for… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: Advances in Neural Information Processing Systems (NeurIPS) 2023, Workshop on robustness of zero/few-shot learning in foundation models

  4. arXiv:2308.11754  [pdf, other

    cs.CR cs.AI

    Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection

    Authors: Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma

    Abstract: Malicious domain detection (MDD) is an open security challenge that aims to detect if an Internet domain is associated with cyber-attacks. Among many approaches to this problem, graph neural networks (GNNs) are deemed highly effective. GNN-based MDD uses DNS logs to represent Internet domains as nodes in a maliciousness graph (DMG) and trains a GNN to infer their maliciousness by leveraging identi… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: To Appear in the 45th IEEE Symposium on Security and Privacy (IEEE S\&P 2024), May 20-23, 2024

  5. arXiv:2308.09219  [pdf, other

    cs.AI cs.MA

    Learning in Cooperative Multiagent Systems Using Cognitive and Machine Models

    Authors: Thuy Ngoc Nguyen, Duy Nhat Phan, Cleotilde Gonzalez

    Abstract: Developing effective Multi-Agent Systems (MAS) is critical for many applications requiring collaboration and coordination with humans. Despite the rapid advance of Multi-Agent Deep Reinforcement Learning (MADRL) in cooperative MAS, one major challenge is the simultaneous learning and interaction of independent agents in dynamic environments in the presence of stochastic rewards. State-of-the-art M… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 22 pages, 5 figures, 2 tables

  6. arXiv:2305.16474  [pdf, other

    cs.LG cs.CR cs.CY

    FairDP: Certified Fairness with Differential Privacy

    Authors: Khang Tran, Ferdinando Fioretto, Issa Khalil, My T. Thai, NhatHai Phan

    Abstract: This paper introduces FairDP, a novel mechanism designed to achieve certified fairness with differential privacy (DP). FairDP independently trains models for distinct individual groups, using group-specific clipping terms to assess and bound the disparate impacts of DP. Throughout the training process, the mechanism progressively integrates knowledge from group models to formulate a comprehensive… ▽ More

    Submitted 21 August, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

  7. ViMQ: A Vietnamese Medical Question Dataset for Healthcare Dialogue System Development

    Authors: Ta Duc Huy, Nguyen Anh Tu, Tran Hoang Vu, Nguyen Phuc Minh, Nguyen Phan, Trung H. Bui, Steven Q. H. Truong

    Abstract: Existing medical text datasets usually take the form of question and answer pairs that support the task of natural language generation, but lacking the composite annotations of the medical terms. In this study, we publish a Vietnamese dataset of medical questions from patients with sentence-level and entity-level annotations for the Intent Classification and Named Entity Recognition tasks. The tag… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: accepted at ICONIP 2021

  8. arXiv:2303.06246  [pdf, other

    cs.LG cs.AI cs.DC

    Zone-based Federated Learning for Mobile Sensing Data

    Authors: Xiaopeng Jiang, Thinh On, NhatHai Phan, Hessamaldin Mohammadi, Vijaya Datta Mayyuri, An Chen, Ruoming Jin, Cristian Borcea

    Abstract: Mobile apps, such as mHealth and wellness applications, can benefit from deep learning (DL) models trained with mobile sensing data collected by smart phones or wearable devices. However, currently there is no mobile sensing DL system that simultaneously achieves good model accuracy while adapting to user mobility behavior, scales well as the number of users increases, and protects user data priva… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  9. arXiv:2302.12685  [pdf, other

    cs.LG cs.AI cs.CR

    Active Membership Inference Attack under Local Differential Privacy in Federated Learning

    Authors: Truc Nguyen, Phung Lai, Khang Tran, NhatHai Phan, My T. Thai

    Abstract: Federated learning (FL) was originally regarded as a framework for collaborative learning among clients with data privacy protection through a coordinating server. In this paper, we propose a new active membership inference (AMI) attack carried out by a dishonest server in FL. In AMI attacks, the server crafts and embeds malicious parameters into global models to effectively infer whether a target… ▽ More

    Submitted 24 July, 2023; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: Published at AISTATS 2023

    Journal ref: Proceedings of The 26th International Conference on Artificial Intelligence and Statistics, PMLR 206:5714-5730, 2023

  10. arXiv:2302.00911  [pdf, other

    stat.ML cs.LG

    Conditional expectation with regularization for missing data imputation

    Authors: Mai Anh Vu, Thu Nguyen, Tu T. Do, Nhan Phan, Nitesh V. Chawla, Pål Halvorsen, Michael A. Riegler, Binh T. Nguyen

    Abstract: Missing data frequently occurs in datasets across various domains, such as medicine, sports, and finance. In many cases, to enable proper and reliable analyses of such data, the missing values are often imputed, and it is necessary that the method used has a low root mean square error (RMSE) between the imputed and the true values. In addition, for some critical applications, it is also often a re… ▽ More

    Submitted 11 September, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

  11. arXiv:2301.09567  [pdf, other

    cs.GR cs.AI cs.LG

    Rig Inversion by Training a Differentiable Rig Function

    Authors: Mathieu Marquis Bolduc, Hau Nghiep Phan

    Abstract: Rig inversion is the problem of creating a method that can find the rig parameter vector that best approximates a given input mesh. In this paper we propose to solve this problem by first obtaining a differentiable rig function by training a multi layer perceptron to approximate the rig function. This differentiable rig function can then be used to train a deep learning model of rig inversion.

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: Presented at Siggraph Asia '22 in Daegu, South Korea

    Journal ref: SA '22: SIGGRAPH Asia 2022 Technical Communications, December 2022, Article No.: 15

  12. arXiv:2212.04454  [pdf, other

    cs.LG cs.CR

    XRand: Differentially Private Defense against Explanation-Guided Attacks

    Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai

    Abstract: Recent development in the field of explainable artificial intelligence (XAI) has helped improve trust in Machine-Learning-as-a-Service (MLaaS) systems, in which an explanation is provided together with the model prediction in response to each query. However, XAI also opens a door for adversaries to gain insights into the black-box models in MLaaS, thereby making the models more vulnerable to sever… ▽ More

    Submitted 14 December, 2022; v1 submitted 8 December, 2022; originally announced December 2022.

    Comments: To be published at AAAI 2023

  13. arXiv:2211.05766  [pdf, other

    cs.LG cs.CR

    Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks

    Authors: Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Thai, Xintao Wu

    Abstract: Graph neural networks (GNNs) are susceptible to privacy inference attacks (PIAs), given their ability to learn joint representation from features and edges among nodes in graph data. To prevent privacy leakages in GNNs, we propose a novel heterogeneous randomized response (HeteroRR) mechanism to protect nodes' features and edges against PIAs under differential privacy (DP) guarantees without an un… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    Comments: Accepted in IEEE BigData 2022 (short paper)

  14. arXiv:2211.01141  [pdf, other

    cs.CR cs.CL cs.LG

    User-Entity Differential Privacy in Learning Natural Language Models

    Authors: Phung Lai, NhatHai Phan, Tong Sun, Rajiv Jain, Franck Dernoncourt, Jiuxiang Gu, Nikolaos Barmpalios

    Abstract: In this paper, we introduce a novel concept of user-entity differential privacy (UeDP) to provide formal privacy protection simultaneously to both sensitive entities in textual data and data owners in learning natural language models (NLMs). To preserve UeDP, we developed a novel algorithm, called UeDP-Alg, optimizing the trade-off between privacy loss and model utility with a tight sensitivity bo… ▽ More

    Submitted 8 November, 2022; v1 submitted 1 November, 2022; originally announced November 2022.

    Comments: Accepted at IEEE BigData 2022

  15. arXiv:2210.05165  [pdf, ps, other

    stat.ML cs.LG

    Combining datasets to increase the number of samples and improve model fitting

    Authors: Thu Nguyen, Rabindra Khadka, Nhan Phan, Anis Yazidi, Pål Halvorsen, Michael A. Riegler

    Abstract: For many use cases, combining information from different datasets can be of interest to improve a machine learning model's performance, especially when the number of samples from at least one of the datasets is small. However, a potential challenge in such cases is that the features from these datasets are not identical, even though there are some commonly shared features among the datasets. To ta… ▽ More

    Submitted 16 May, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

  16. arXiv:2209.13126  [pdf, other

    cs.LG

    Design of experiments for the calibration of history-dependent models via deep reinforcement learning and an enhanced Kalman filter

    Authors: Ruben Villarreal, Nikolaos N. Vlassis, Nhon N. Phan, Tommie A. Catanach, Reese E. Jones, Nathaniel A. Trask, Sharlotte L. B. Kramer, WaiChing Sun

    Abstract: Experimental data is costly to obtain, which makes it difficult to calibrate complex models. For many models an experimental design that produces the best calibration given a limited experimental budget is not obvious. This paper introduces a deep reinforcement learning (RL) algorithm for design of experiments that maximizes the information gain measured by Kullback-Leibler (KL) divergence obtaine… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

    Comments: 40 pages, 20 figures

  17. arXiv:2207.12831  [pdf, other

    cs.LG cs.AI cs.CR

    Lifelong DP: Consistently Bounded Differential Privacy in Lifelong Machine Learning

    Authors: Phung Lai, Han Hu, NhatHai Phan, Ruoming Jin, My T. Thai, An M. Chen

    Abstract: In this paper, we show that the process of continually learning new tasks and memorizing previous tasks introduces unknown privacy risks and challenges to bound the privacy loss. Based upon this, we introduce a formal definition of Lifelong DP, in which the participation of any data tuples in the training set of any tasks is protected, under a consistently bounded DP protection, given a growing st… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

  18. arXiv:2207.05422  [pdf, other

    cs.CV

    Improving Domain Generalization by Learning without Forgetting: Application in Retail Checkout

    Authors: Thuy C. Nguyen, Nam LH. Phan, Son T. Nguyen

    Abstract: Designing an automatic checkout system for retail stores at the human level accuracy is challenging due to similar appearance products and their various poses. This paper addresses the problem by proposing a method with a two-stage pipeline. The first stage detects class-agnostic items, and the second one is dedicated to classify product categories. We also track the objects across video frames to… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  19. arXiv:2205.09826  [pdf, other

    cs.LO cs.AI cs.DS

    DPER: Dynamic Programming for Exist-Random Stochastic SAT

    Authors: Vu H. N. Phan, Moshe Y. Vardi

    Abstract: In Bayesian inference, the maximum a posteriori (MAP) problem combines the most probable explanation (MPE) and marginalization (MAR) problems. The counterpart in propositional logic is the exist-random stochastic satisfiability (ER-SSAT) problem, which combines the satisfiability (SAT) and weighted model counting (WMC) problems. Both MAP and ER-SSAT have the form… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.08632

  20. arXiv:2205.08632  [pdf, other

    cs.LO cs.AI cs.DS

    DPO: Dynamic-Programming Optimization on Hybrid Constraints

    Authors: Vu H. N. Phan, Moshe Y. Vardi

    Abstract: In Bayesian inference, the most probable explanation (MPE) problem requests a variable instantiation with the highest probability given some evidence. Since a Bayesian network can be encoded as a literal-weighted CNF formula $\varphi$, we study Boolean MPE, a more general problem that requests a model $τ$ of $\varphi$ with the highest weight, where the weight of $τ$ is the product of weights of li… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

  21. arXiv:2203.14876  [pdf, other

    cs.CL cs.SD eess.AS

    Finnish Parliament ASR corpus - Analysis, benchmarks and statistics

    Authors: Anja Virkkunen, Aku Rouhe, Nhan Phan, Mikko Kurimo

    Abstract: Public sources like parliament meeting recordings and transcripts provide ever-growing material for the training and evaluation of automatic speech recognition (ASR) systems. In this paper, we publish and analyse the Finnish parliament ASR corpus, the largest publicly available collection of manually transcribed speech data for Finnish with over 3000 hours of speech and 449 speakers for which it p… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: Submitted to Language Resources and Evaluation

  22. arXiv:2203.12899  [pdf, other

    cs.CV eess.IV

    Facial Expression Classification using Fusion of Deep Neural Network in Video for the 3rd ABAW3 Competition

    Authors: Kim Ngan Phan, Hong-Hai Nguyen, Van-Thong Huynh, Soo-Hyung Kim

    Abstract: For computers to recognize human emotions, expression classification is an equally important problem in the human-computer interaction area. In the 3rd Affective Behavior Analysis In-The-Wild competition, the task of expression classification includes eight classes with six basic expressions of human faces from videos. In this paper, we employ a transformer mechanism to encode the robust represent… ▽ More

    Submitted 8 April, 2022; v1 submitted 24 March, 2022; originally announced March 2022.

  23. arXiv:2203.01635  [pdf, ps, other

    cs.LG

    Parallel feature selection based on the trace ratio criterion

    Authors: Thu Nguyen, Thanh Nhan Phan, Van Nhuong Nguyen, Thanh Binh Nguyen, Pål Halvorsen, Michael Riegler

    Abstract: The growth of data today poses a challenge in management and inference. While feature extraction methods are capable of reducing the size of the data for inference, they do not help in minimizing the cost of data storage. On the other hand, feature selection helps to remove the redundant features and therefore is helpful not only in inference but also in reducing management costs. This work presen… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

  24. arXiv:2201.07063  [pdf, other

    cs.LG cs.CR

    How to Backdoor HyperNetwork in Personalized Federated Learning?

    Authors: Phung Lai, NhatHai Phan, Issa Khalil, Abdallah Khreishah, Xintao Wu

    Abstract: This paper explores previously unknown backdoor risks in HyperNet-based personalized federated learning (HyperNetFL) through poisoning attacks. Based upon that, we propose a novel model transferring attack (called HNTroj), i.e., the first of its kind, to transfer a local backdoor infected model to all legitimate and personalized local models, which are generated by the HyperNetFL model, through co… ▽ More

    Submitted 11 December, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  25. arXiv:2111.10268  [pdf, other

    cs.IR cs.MA

    SpeedyIBL: A Comprehensive, Precise, and Fast Implementation of Instance-Based Learning Theory

    Authors: Thuy Ngoc Nguyen, Duy Nhat Phan, Cleotilde Gonzalez

    Abstract: Instance-Based Learning Theory (IBLT) is a comprehensive account of how humans make decisions from experience during dynamic tasks. Since it was first proposed almost two decades ago, multiple computational models have been constructed based on IBLT (i.e., IBL models). These models have been demonstrated to be very successful in explaining and predicting human decisions in multiple decision making… ▽ More

    Submitted 5 April, 2022; v1 submitted 19 November, 2021; originally announced November 2021.

  26. arXiv:2111.09445  [pdf, other

    cs.LG cs.AI cs.DC eess.SY

    FLSys: Toward an Open Ecosystem for Federated Learning Mobile Apps

    Authors: Xiaopeng Jiang, Han Hu, Vijaya Datta Mayyuri, An Chen, Devu M. Shila, Adriaan Larmuseau, Ruoming Jin, Cristian Borcea, NhatHai Phan

    Abstract: This article presents the design, implementation, and evaluation of FLSys, a mobile-cloud federated learning (FL) system, which can be a key component for an open ecosystem of FL models and apps. FLSys is designed to work on smart phones with mobile sensing data. It balances model performance with resource consumption, tolerates communication failures, and achieves scalability. In FLSys, different… ▽ More

    Submitted 10 March, 2023; v1 submitted 17 November, 2021; originally announced November 2021.

  27. arXiv:2110.05223  [pdf, other

    cs.LG cs.CR

    Continual Learning with Differential Privacy

    Authors: Pradnya Desai, Phung Lai, NhatHai Phan, My T. Thai

    Abstract: In this paper, we focus on preserving differential privacy (DP) in continual learning (CL), in which we train ML models to learn a sequence of new tasks while memorizing previous tasks. We first introduce a notion of continual adjacent databases to bound the sensitivity of any data record participating in the training process of CL. Based upon that, we develop a new DP-preserving algorithm for CL… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

    Comments: The paper will appear at ICONIP21

  28. arXiv:2109.01275  [pdf, other

    cs.CR cs.LG

    A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples

    Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan

    Abstract: In this work, we show how to jointly exploit adversarial perturbation and model poisoning vulnerabilities to practically launch a new stealthy attack, dubbed AdvTrojan. AdvTrojan is stealthy because it can be activated only when: 1) a carefully crafted adversarial perturbation is injected into the input examples during inference, and 2) a Trojan backdoor is implanted during the training process of… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

  29. arXiv:2108.10520  [pdf, other

    cs.CV

    Improving Object Detection by Label Assignment Distillation

    Authors: Chuong H. Nguyen, Thuy C. Nguyen, Tuan N. Tang, Nam L. H. Phan

    Abstract: Label assignment in object detection aims to assign targets, foreground or background, to sampled regions in an image. Unlike labeling for image classification, this problem is not well defined due to the object's bounding box. In this paper, we investigate the problem from a perspective of distillation, hence we call Label Assignment Distillation (LAD). Our initial motivation is very simple, we u… ▽ More

    Submitted 19 October, 2021; v1 submitted 24 August, 2021; originally announced August 2021.

    Comments: To appear in WACV 2022

  30. arXiv:2106.06649  [pdf, other

    cs.CV

    1st Place Solution for YouTubeVOS Challenge 2021:Video Instance Segmentation

    Authors: Thuy C. Nguyen, Tuan N. Tang, Nam LH. Phan, Chuong H. Nguyen, Masayuki Yamazaki, Masao Yamanaka

    Abstract: Video Instance Segmentation (VIS) is a multi-task problem performing detection, segmentation, and tracking simultaneously. Extended from image set applications, video data additionally induces the temporal information, which, if handled appropriately, is very useful to identify and predict object motions. In this work, we design a unified model to mutually learn these tasks. Specifically, we propo… ▽ More

    Submitted 8 July, 2021; v1 submitted 11 June, 2021; originally announced June 2021.

    Comments: Accepted to CPVR 2021 Workshop

  31. arXiv:2106.03776  [pdf, other

    cs.CV cs.LG

    CDN-MEDAL: Two-stage Density and Difference Approximation Framework for Motion Analysis

    Authors: Synh Viet-Uyen Ha, Cuong Tien Nguyen, Hung Ngoc Phan, Nhat Minh Chung, Phuong Hoai Ha

    Abstract: Background modeling and subtraction is a promising research area with a variety of applications for video surveillance. Recent years have witnessed a proliferation of effective learning-based deep neural networks in this area. However, the techniques have only provided limited descriptions of scenes' properties while requiring heavy computations, as their single-valued mapping functions are learne… ▽ More

    Submitted 21 September, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: 13 pages, 5 figures, to be submitted to IEEE TMM

  32. arXiv:2106.03598  [pdf, other

    cs.CL cs.AI cs.LG

    SciFive: a text-to-text transformer model for biomedical literature

    Authors: Long N. Phan, James T. Anibal, Hieu Tran, Shaurya Chanana, Erol Bahadroglu, Alec Peltekian, Grégoire Altan-Bonnet

    Abstract: In this report, we introduce SciFive, a domain-specific T5 model that has been pre-trained on large biomedical corpora. Our model outperforms the current SOTA methods (i.e. BERT, BioBERT, Base T5) on tasks in named entity relation, relation extraction, natural language inference, and question-answering. We show that text-generation methods have significant potential in a broad array of biomedical… ▽ More

    Submitted 28 May, 2021; originally announced June 2021.

  33. arXiv:2102.05433  [pdf, other

    math.OC cs.LG eess.SP

    A Framework of Inertial Alternating Direction Method of Multipliers for Non-Convex Non-Smooth Optimization

    Authors: Le Thi Khanh Hien, Duy Nhat Phan, Nicolas Gillis

    Abstract: In this paper, we propose an algorithmic framework, dubbed inertial alternating direction methods of multipliers (iADMM), for solving a class of nonconvex nonsmooth multiblock composite optimization problems with linear constraints. Our framework employs the general minimization-majorization (MM) principle to update each block of variables so as to not only unify the convergence analysis of previo… ▽ More

    Submitted 24 June, 2022; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 35 pages, several parts of the paper clarified, additional experiments on a regularized NMF problem

    Journal ref: Computational Optimization and Applications 83, pp. 247-285, 2022

  34. arXiv:2010.12133  [pdf, other

    math.OC cs.LG eess.SP

    An Inertial Block Majorization Minimization Framework for Nonsmooth Nonconvex Optimization

    Authors: Le Thi Khanh Hien, Duy Nhat Phan, Nicolas Gillis

    Abstract: In this paper, we introduce TITAN, a novel inerTIal block majorizaTion minimizAtioN framework for non-smooth non-convex optimization problems. To the best of our knowledge, TITAN is the first framework of block-coordinate update method that relies on the majorization-minimization framework while embedding inertial force to each step of the block updates. The inertial force is obtained via an extra… ▽ More

    Submitted 20 September, 2022; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: 42 pages, we have clarified several aspects of the paper

    Journal ref: Journal on Machine Learning Research 24 (18), pp. 1-41, 2023

  35. arXiv:2008.08748  [pdf, other

    cs.LO cs.AI cs.DS

    DPMC: Weighted Model Counting by Dynamic Programming on Project-Join Trees

    Authors: Jeffrey M. Dudek, Vu H. N. Phan, Moshe Y. Vardi

    Abstract: We propose a unifying dynamic-programming framework to compute exact literal-weighted model counts of formulas in conjunctive normal form. At the center of our framework are project-join trees, which specify efficient project-join orders to apply additive projections (variable eliminations) and joins (clause multiplications). In this framework, model counting is performed in two phases. First, the… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: Full version of paper at CP 2020 (26th International Conference on Principles and Practice of Constraint Programming)

  36. arXiv:2004.00204  [pdf, other

    cs.LG cs.AI stat.ML

    Ontology-based Interpretable Machine Learning for Textual Data

    Authors: Phung Lai, NhatHai Phan, Han Hu, Anuja Badeti, David Newman, Dejing Dou

    Abstract: In this paper, we introduce a novel interpreting framework that learns an interpretable model based on an ontology-based sampling technique to explain agnostic prediction models. Different from existing approaches, our algorithm considers contextual correlation among words, described in domain knowledge ontologies, to generate semantic explanations. To narrow down the search space for explanations… ▽ More

    Submitted 31 March, 2020; originally announced April 2020.

    Comments: Accepted by IJCNN 2020

  37. arXiv:1911.03992  [pdf, ps, other

    math.OC cs.LG math.NA

    Stochastic DCA for minimizing a large sum of DC functions with application to Multi-class Logistic Regression

    Authors: Hoai An Le Thi, Hoai Minh Le, Duy Nhat Phan, Bach Tran

    Abstract: We consider the large sum of DC (Difference of Convex) functions minimization problem which appear in several different areas, especially in stochastic optimization and machine learning. Two DCA (DC Algorithm) based algorithms are proposed: stochastic DCA and inexact stochastic DCA. We prove that the convergence of both algorithms to a critical point is guaranteed with probability one. Furthermore… ▽ More

    Submitted 10 November, 2019; originally announced November 2019.

  38. arXiv:1907.05000  [pdf, other

    cs.LO cs.AI cs.DS

    ADDMC: Weighted Model Counting with Algebraic Decision Diagrams

    Authors: Jeffrey M. Dudek, Vu H. N. Phan, Moshe Y. Vardi

    Abstract: We present an algorithm to compute exact literal-weighted model counts of Boolean formulas in Conjunctive Normal Form. Our algorithm employs dynamic programming and uses Algebraic Decision Diagrams as the primary data structure. We implement this technique in ADDMC, a new model counter. We empirically evaluate various heuristics that can be used with ADDMC. We then compare ADDMC to state-of-the-ar… ▽ More

    Submitted 2 June, 2020; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: Presented at AAAI 2020

  39. arXiv:1906.02032  [pdf, other

    cs.LG stat.ML

    c-Eval: A Unified Metric to Evaluate Feature-based Explanations via Perturbation

    Authors: Minh N. Vu, Truc D. Nguyen, NhatHai Phan, Ralucca Gera, My T. Thai

    Abstract: In many modern image-classification applications, understanding the cause of model's prediction can be as critical as the prediction's accuracy itself. Various feature-based local explanations generation methods have been designed to give us more insights on the decision of complex classifiers. Nevertheless, there is no consensus on evaluating the quality of different explanations. In response to… ▽ More

    Submitted 10 August, 2020; v1 submitted 5 June, 2019; originally announced June 2019.

  40. arXiv:1906.01444  [pdf, other

    cs.CR cs.LG

    Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness

    Authors: NhatHai Phan, Minh Vu, Yang Liu, Ruoming Jin, Dejing Dou, Xintao Wu, My T. Thai

    Abstract: In this paper, we propose a novel Heterogeneous Gaussian Mechanism (HGM) to preserve differential privacy in deep neural networks, with provable robustness against adversarial examples. We first relax the constraint of the privacy budget in the traditional Gaussian Mechanism from (0, 1] to (0, \infty), with a new bound of the noise scale to preserve differential privacy. The noise in our mechanism… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.09822

  41. arXiv:1904.02062  [pdf

    cs.SI

    An Ensemble Deep Learning Model for Drug Abuse Detection in Sparse Twitter-Sphere

    Authors: Han Hu, NhatHai Phan, James Geller, Stephen Iezzi, Huy Vo, Dejing Dou, Soon Ae Chun

    Abstract: As the problem of drug abuse intensifies in the U.S., many studies that primarily utilize social media data, such as postings on Twitter, to study drug abuse-related activities use machine learning as a powerful tool for text classification and filtering. However, given the wide range of topics of Twitter users, tweets related to drug abuse are rare in most of the datasets. This imbalanced data re… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: The 17th World Congress of Medical and Health Informatics [MedInfo 2019]

  42. arXiv:1903.09822  [pdf, other

    cs.CR

    Scalable Differential Privacy with Certified Robustness in Adversarial Learning

    Authors: NhatHai Phan, My T. Thai, Han Hu, Ruoming Jin, Tong Sun, Dejing Dou

    Abstract: In this paper, we aim to develop a scalable algorithm to preserve differential privacy (DP) in adversarial learning for deep neural networks (DNNs), with certified robustness to adversarial examples. By leveraging the sequential composition theory in DP, we randomize both input and latent spaces to strengthen our certified robustness bounds. To address the trade-off among model utility, privacy lo… ▽ More

    Submitted 15 September, 2020; v1 submitted 23 March, 2019; originally announced March 2019.

    Comments: To appear at ICML'2020 (29 pages)

  43. arXiv:1903.05783  [pdf

    cs.SE cs.CY

    A Novel Re-Targetable Application Development Platform for Healthcare Mobile Applications

    Authors: Chae Ho Cho, Fatemehsadat Tabei, Tra Nguyen Phan, Yeesock Kim, Jo Woon Chong

    Abstract: The rapid enhancement of central power unit CPU performance enables the development of computationally-intensive healthcare mobile applications for smartphones and wearable devices. However, computationally intensive mobile applications require significant application development time during the application porting procedure when the number of considering target devices operating systems OSs is la… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

    Journal ref: International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 9,Page: 196-201, September 2017

  44. arXiv:1806.09620  [pdf, other

    math.OC cs.LG math.NA

    A DCA-Like Algorithm and its Accelerated Version with Application in Data Visualization

    Authors: Hoai An Le Thi, Hoai Minh Le, Duy Nhat Phan, Bach Tran

    Abstract: In this paper, we present two variants of DCA (Different of Convex functions Algorithm) to solve the constrained sum of differentiable function and composite functions minimization problem, with the aim of increasing the convergence speed of DCA. In the first variant, DCA-Like, we introduce a new technique to iteratively modify the decomposition of the objective function. This successive decomposi… ▽ More

    Submitted 25 June, 2018; originally announced June 2018.

  45. arXiv:1709.05750  [pdf, other

    cs.CR cs.LG stat.ML

    Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning

    Authors: NhatHai Phan, Xintao Wu, Han Hu, Dejing Dou

    Abstract: In this paper, we focus on developing a novel mechanism to preserve differential privacy in deep neural networks, such that: (1) The privacy budget consumption is totally independent of the number of training steps; (2) It has the ability to adaptively inject noise into features based on the contribution of each to the output; and (3) It could be applied in a variety of different deep neural netwo… ▽ More

    Submitted 22 April, 2018; v1 submitted 17 September, 2017; originally announced September 2017.

    Comments: IEEE ICDM 2017 - regular paper

  46. arXiv:1709.03565  [pdf, other

    cs.DS

    Importance Sketching of Influence Dynamics in Billion-scale Networks

    Authors: Hung T. Nguyen, Tri P. Nguyen, NhatHai Phan, Thang N. Dinh

    Abstract: The blooming availability of traces for social, biological, and communication networks opens up unprecedented opportunities in analyzing diffusion processes in networks. However, the sheer sizes of the nowadays networks raise serious challenges in computational efficiency and scalability. In this paper, we propose a new hyper-graph sketching framework for inflence dynamics in networks. The centr… ▽ More

    Submitted 11 September, 2017; originally announced September 2017.

    Comments: 12 pages, to appear in ICDM 2017 as a regular paper

  47. arXiv:1706.08839  [pdf, other

    cs.LG stat.ML

    Preserving Differential Privacy in Convolutional Deep Belief Networks

    Authors: NhatHai Phan, Xintao Wu, Dejing Dou

    Abstract: The remarkable development of deep learning in medicine and healthcare domain presents obvious privacy issues, when deep neural networks are built on users' personal and highly sensitive data, e.g., clinical records, user profiles, biomedical images, etc. However, only a few scientific studies on preserving privacy in deep learning have been conducted. In this paper, we focus on developing a priva… ▽ More

    Submitted 22 April, 2018; v1 submitted 25 June, 2017; originally announced June 2017.